MetaAccess API

Endpoint Security and Compliance Development Platform

MetaAccess offers APIs to add endpoint security and cloud access control to your existing security solution, saving developer time and allowing you to focus on your core business. Our cloud platform is used to enforce device security and compliance for enterprise networks as well as SaaS applications. Powered by MetaDefender technologies, you can also leverage advanced endpoint security features to reinforce your cloud application secure access.

Pat Lee

Highlights

Detailed Device Compliance Information

The MetaAccess API provides comprehensive endpoint security status by examining the presence and state of installed anti-malware, disk encryption, antiphishing, public file sharing applications, vulnerability and OS patches and updates.

Patented Technologies for Endpoint Security

Our patented cloud access control technologies deploy innovative methods to determine the status of important compliance features, ensuring that only trusted devices are allowed access as well as providing seamless integration into the single sign-on authentication process.

Support for Many Platforms

MetaAccess APIs offer market-leading endpoint posture assessment capabilities across Windows, macOS, Linux, Android, and iOS platforms. An open source client is also available, which can be used to enforce security for Internet of Things (IoT) devices.

Easy Integration

Our MetaAccess device security platform offers a variety of deployment options, including persistent and on-demand agents, with and without evaluated permissions. There is no need to develop your own agent, you can simply integrate with MetaAccess at the API level and we will handle the rest.

Flexible Deployment

We offer a cloud-based service to seamlessly support integration with cloud applications. In addition, we offer a component of the platform to partners and customers for on-premises deployments. This component includes the full API and account-based data storage to further increase service resiliency and reduce the overhead of communicating with the cloud.

How to Integrate with MetaAccess

The MetaAccess device security platform can be used to enhance secure access solutions for both enterprise networks and SaaS applications, such as SSL VPN, IPSEC VPN, network access control (NAC), cloud access security brokers (CASB), and Single Sign-on (SSO). In addition, MetaAccess capabilities can be integrated into remote monitoring and management platforms for endpoint compliance visibility. The MetaAccess device security platform offers the following integration options:

Integration using OAuth API

With this integration option, your solution will query the device status on MetaAccess via our OAuth API, make the decision to allow or deny access, and if applicable show an error message to end users.

Developers can use device MAC addresses or device IDs to query device health and compliance status via the OAuth API. The MetaAccess agent generates unique identities for each device, and offers multiple mechanisms, such as browser cookies, client certificates, and cross-domain APIs, to communicate the device ID to the integrated third-party solution. Learn more about how to integrate with MetaAccess using OAuth API.

VMware and OPSWAT Integration

An example of this type of integration is VMware’s integration of MetaAccess to enforce device compliance before allowing access to their VMware Horizon service that provides users with virtual desktops and applications.

Integration with IdP Through SAML

Using this method, MetaAccess handles access control based on device status and the access rules that customers can configure on our cloud console, IdPs and Service Providers (SPs). After IdPs authenticate the users, prior to forwarding directly to SPs, MetaAccess performs security and posture checks on the device to either grant or deny access. If access is granted, MetaAccess allows the authenticated users to move forward to the destination SPs. If access is not granted, the user is shown a customizable remediation page with instructions on how to fix the problems.

With this integration option, you can build device compliance checks for cloud-based applications such as Salesforce, Office 365, and Dropbox.

This website stores cookies on your computer. These cookies are used to improve the usability of this website and provide more personalized experience for you, both on this website and through other websites. To find out more about the cookies we use, see our Cookie Notice Policy.